Deck 14: Using Technology to Manage Information
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/135
Play
Full screen (f)
Deck 14: Using Technology to Manage Information
1
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A system that allows top managers to access a company's primary databases is called a(n)_____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A system that allows top managers to access a company's primary databases is called a(n)_____.
n
2
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A computer network that connects machines within a limited area is called a(n)_____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A computer network that connects machines within a limited area is called a(n)_____.
j
3
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ uses powerful servers to store applications software and databases for users to access via the Web.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ uses powerful servers to store applications software and databases for users to access via the Web.
q
4
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
5
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as _____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as _____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
6
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
7
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
8
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A _____ refers to a company's ability to invest in and keep pace with constant changes in the age of technology.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A _____ refers to a company's ability to invest in and keep pace with constant changes in the age of technology.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
9
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ consist of raw facts and figures that may or may not be relevant to business decisions.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ consist of raw facts and figures that may or may not be relevant to business decisions.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
10
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is a computer program that imitates human thinking through complicated sets of if-then rules.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is a computer program that imitates human thinking through complicated sets of if-then rules.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
11
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A centralized integrated collection of data resources is known as a(n)_____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A centralized integrated collection of data resources is known as a(n)_____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
12
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The _____ of a company is an organized method for collecting,storing,and communicating past,present,and projected data on internal operations and external intelligence.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The _____ of a company is an organized method for collecting,storing,and communicating past,present,and projected data on internal operations and external intelligence.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
13
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
14
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Less expensive and simpler versions of existing products and services that target entirely new customers,many times replacing industry leaders,are known as _____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Less expensive and simpler versions of existing products and services that target entirely new customers,many times replacing industry leaders,are known as _____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
15
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ is a discipline that promotes an integrated approach to identifying,capturing,evaluating,retrieving,and sharing all of an enterprise's information assets.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
_____ is a discipline that promotes an integrated approach to identifying,capturing,evaluating,retrieving,and sharing all of an enterprise's information assets.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
16
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A company network that links employees via Internet tools is called a(n)_____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A company network that links employees via Internet tools is called a(n)_____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
17
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an executive responsible for managing a company's information system and related computer technologies.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is an executive responsible for managing a company's information system and related computer technologies.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
18
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is a network of PCs that have been infected with one or more data-stealing viruses.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A(n)_____ is a network of PCs that have been infected with one or more data-stealing viruses.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
19
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A secure connection between two points on the Internet is known as a(n)_____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
A secure connection between two points on the Internet is known as a(n)_____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
20
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The purpose of a(n)_____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The purpose of a(n)_____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
21
Provide examples of ethical concerns surrounding information technology and information systems.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
22
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Wikipedia and other online sources replacing traditional print encyclopedias are examples of _____.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Wikipedia and other online sources replacing traditional print encyclopedias are examples of _____.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following everyday items has been replaced by the present smart phone?
A)Answering machine
B)Printer
C)Photocopier
D)Weighing balance
A)Answering machine
B)Printer
C)Photocopier
D)Weighing balance
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
24
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The term _____ refers to startup companies worth $1 billion or more.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
The term _____ refers to startup companies worth $1 billion or more.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
25
List and briefly explain the most widely used applications of computers.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
26
Explain the difference between data and information.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
27
Complete the following using the terms listed.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Uber and Airbnb are examples of companies referred to as _____,which use innovative business models to bring about disruption in a particular industry.
a.CIO
b.Knowledge management
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.Wi-Fi
h.intranet
i.malware
j.local area network
k.data
l.digital workforce
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
s.information system
t.disruptive innovations
u.unicorns
Uber and Airbnb are examples of companies referred to as _____,which use innovative business models to bring about disruption in a particular industry.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss the responsibilities of a computer systems analyst.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
29
Provide the five important tasks for off-site data storage.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
30
Explain the difference between a virus and a Trojan horse.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
31
Describe a wide area network and explain how companies use it.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
32
Define databases and describe how they are obtained and their uses.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
33
Discuss how smart phones have become the most important innovation in the technological revolution impacting businesses today.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
34
Identify four significant trends about information systems.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
35
Discuss using examples how technology is changing businesses today.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
36
Explain the concept of big data.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
37
Explain the difference between hardware and software.Give examples of both.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
38
Explain the concept of disruptive innovations using examples.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
39
Define and illustrate the concept of business analytics.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
40
Describe at least two ways in which common cybercrimes occur.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is an example of a unicorn,a company that uses innovative business models to bring about disruption in a particular industry?
A)Walmart
B)Uber
C)Netflix
D)Amazon
A)Walmart
B)Uber
C)Netflix
D)Amazon
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
42
A computer program that imitates human thinking is a(n)________.
A)information interface
B)decision support system
C)enterprise resource planning system
D)expert system
A)information interface
B)decision support system
C)enterprise resource planning system
D)expert system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is true of an effective chief information officer (CIO)?
A)Not all large companies relying on information systems need a CIO.
B)He or she is closely connected to the company's overall business strategies and marketing efforts.
C)The CIO of today is focused on installation and design of software.
D)He or she is an independent asset of a company and does not report to anyone.
A)Not all large companies relying on information systems need a CIO.
B)He or she is closely connected to the company's overall business strategies and marketing efforts.
C)The CIO of today is focused on installation and design of software.
D)He or she is an independent asset of a company and does not report to anyone.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
44
Why is Netflix considered a disruptive innovation?
A)It offers a new range of products to consumers.
B)It has more competitors.
C)It targets an entirely new customer base.
D)It has high subscription charges.
A)It offers a new range of products to consumers.
B)It has more competitors.
C)It targets an entirely new customer base.
D)It has high subscription charges.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
45
One of the largest online databases is owned by ________.
A)IBM
B)the U.S.Census Bureau
C)the Federal Trade Commission (FTC)
D)Microsoft
A)IBM
B)the U.S.Census Bureau
C)the Federal Trade Commission (FTC)
D)Microsoft
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
46
Hannah is a television executive whose team conducted demographic research for new programs.Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.
A)data
B)groupware
C)database
D)information
A)data
B)groupware
C)database
D)information
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
47
Data mining is the process of:
A)searching and analyzing the amount of complex data a business gathers using standard tools and procedures.
B)using computer-based technology to evaluate information in a database to identify useful trends.
C)collecting,storing,and communicating past,present,and projected information on internal operations and external intelligence.
D)promoting an integrated approach to identifying,capturing,evaluating,retrieving,and sharing all of an enterprise's information assets.
A)searching and analyzing the amount of complex data a business gathers using standard tools and procedures.
B)using computer-based technology to evaluate information in a database to identify useful trends.
C)collecting,storing,and communicating past,present,and projected information on internal operations and external intelligence.
D)promoting an integrated approach to identifying,capturing,evaluating,retrieving,and sharing all of an enterprise's information assets.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
48
A database can best be described as ________.
A)data that has been converted into information
B)data gathered at random from a variety of sources
C)a centralized integrated collection of an organization's data resources
D)a loose collection of ideas
A)data that has been converted into information
B)data gathered at random from a variety of sources
C)a centralized integrated collection of an organization's data resources
D)a loose collection of ideas
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is true of big data?
A)It is constantly changing.
B)It originates from one primary source.
C)It is always structured.
D)It requires traditional processing applications.
A)It is constantly changing.
B)It originates from one primary source.
C)It is always structured.
D)It requires traditional processing applications.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
50
The person who directs a company's management information systems and related computer operations is often called the ________.
A)financial advisor
B)chief information officer
C)executive information manager
D)chief executive officer
A)financial advisor
B)chief information officer
C)executive information manager
D)chief executive officer
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
51
Raw facts and figures are _____.
A)data
B)information
C)a management information system
D)a decision support system
A)data
B)information
C)a management information system
D)a decision support system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
52
Brandon is trying to close a particularly difficult sale.He uses his PDA (personal digital assistant)and a special program to access information within his company's database on pricing.Brandon is using an ________.
A)expert system
B)enterprise resource planning system
C)executive support system
D)application service provider
A)expert system
B)enterprise resource planning system
C)executive support system
D)application service provider
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
53
Online retail stores such as Amazon and Blue Nile are slowly replacing brick-and-mortar stores as more people realize that online purchases save time and provide a wider choice of products.In this scenario,Amazon and Blue Nile are examples of _____.
A)a promotional mix
B)disruptive innovations
C)guerilla marketing strategies
D)institutional advertising strategies
A)a promotional mix
B)disruptive innovations
C)guerilla marketing strategies
D)institutional advertising strategies
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
54
Ron is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Ron used the company's ________ system.
A)executive information
B)decision support
C)database management
D)enterprise resource planning
A)executive information
B)decision support
C)database management
D)enterprise resource planning
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements best describes the purpose of a management information system?
A)It assists the human resources department with research on employee benefit costs.
B)It provides management with feedback from sales meetings.
C)It is designed to produce reports for managers and others within the organization..
D)It assists the accounting department with budget information.
A)It assists the human resources department with research on employee benefit costs.
B)It provides management with feedback from sales meetings.
C)It is designed to produce reports for managers and others within the organization..
D)It assists the accounting department with budget information.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
56
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)_____.
A)decision support system
B)expert system
C)executive information system
D)database management system
A)decision support system
B)expert system
C)executive information system
D)database management system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
57
_____ refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze.
A)Marketing mix
B)Big data
C)Promotional mix
D)Database
A)Marketing mix
B)Big data
C)Promotional mix
D)Database
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
58
Bridgette,a chief executive officer,reviews the internal performance of her company's stock,as well as market trends for the industry.To access this information,Bridgette uses a(n)________.
A)enterprise planning resources
B)executive support system
C)expert system
D)decision support system
A)enterprise planning resources
B)executive support system
C)expert system
D)decision support system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
59
The CEO of WalktheTalk.com,a fashion start-up,is looking to establish the company as foremost in the online retail marketplace.To do so,the CEO must use data-driven decision making to manipulate,analyze,evaluate,and format data from multiple sources such as social media,mobile devices,online sales,and customer service feedback.Which of the following would help the CEO carry out the tasks ahead?
A)Business analytics
B)Promotional mix
C)Big data
D)Marketing mix
A)Business analytics
B)Promotional mix
C)Big data
D)Marketing mix
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is an example of disruptive innovation?
A)Light bulbs
B)Typewriters
C)Digital cameras
D)Cable-operated excavators
A)Light bulbs
B)Typewriters
C)Digital cameras
D)Cable-operated excavators
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
61
James is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts and graphs that he will then show as slides.Which of the following software programs is James most likely using?
A)Microsoft Word
B)Microsoft Excel
C)Microsoft Windows
D)Microsoft PowerPoint
A)Microsoft Word
B)Microsoft Excel
C)Microsoft Windows
D)Microsoft PowerPoint
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is an application program?
A)Unix
B)Java
C)Microsoft Windows
D)Microsoft Excel
A)Unix
B)Java
C)Microsoft Windows
D)Microsoft Excel
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
63
Jose purchases a new game for his computer.He loads the program onto the computer's hard drive.Jose has purchased a(n)________.
A)output device
B)processing device
C)application software
D)operating system
A)output device
B)processing device
C)application software
D)operating system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is a storage device?
A)Thumb drive
B)Modem
C)CRT monitor
D)Scanner
A)Thumb drive
B)Modem
C)CRT monitor
D)Scanner
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
65
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
A)hand held device
B)personal computer
C)mainframe computer
D)midrange system
A)hand held device
B)personal computer
C)mainframe computer
D)midrange system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
66
Rebecca is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Rebecca's company has a(n)________.
A)internet
B)botnet
C)intranet
D)extranet
A)internet
B)botnet
C)intranet
D)extranet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
67
All of the following devices are computer hardware EXCEPT a ________.
A)monitor
B)printer driver
C)fax machine
D)mouse
A)monitor
B)printer driver
C)fax machine
D)mouse
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
68
Many consumers are now treating _____ as replacements for personal computers.
A)smart phones
B)tablets
C)chromebooks
D)netbooks
A)smart phones
B)tablets
C)chromebooks
D)netbooks
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
69
A program that performs specific tasks that the user wants to carry out is called ________.
A)financial software
B)the operating system
C)a management information system
D)application software
A)financial software
B)the operating system
C)a management information system
D)application software
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
70
On Zaxen.com,homebuyers enter information about their preferred home location,price,and features.Using an ________,the website automatically displays real estate properties that match the homebuyer's criteria.
A)executive information system
B)encryption
C)application service provider
D)expert system
A)executive information system
B)encryption
C)application service provider
D)expert system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is a reason for the increasing popularity of notebook computers?
A)More computing capacity than midrange systems
B)Limited displays
C)Faster processing speeds
D)Higher prices
A)More computing capacity than midrange systems
B)Limited displays
C)Faster processing speeds
D)Higher prices
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
72
Amelia is sitting at her computer,analyzing the financial impact of an increase in her company's sales growth rate.Amelia is probably using a ________ program.
A)spreadsheet
B)presentation
C)word processor
D)desktop publishing
A)spreadsheet
B)presentation
C)word processor
D)desktop publishing
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
73
An expert system would most likely be used to ________.
A)retrieve sales data
B)determine the status of a customer's order
C)determine the optimal layout of a plant
D)access relevant data from the company's database
A)retrieve sales data
B)determine the status of a customer's order
C)determine the optimal layout of a plant
D)access relevant data from the company's database
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
74
All Walmart stores have satellite dishes that link stores together with the company's headquarters.Walmart is using a(n)________.
A)wide area network
B)enterprise resource system
C)expert system
D)local area network
A)wide area network
B)enterprise resource system
C)expert system
D)local area network
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
75
The software which controls the basic workings of the computer system is called a(n)_____.
A)expert
B)executive information system
C)database
D)operating system
A)expert
B)executive information system
C)database
D)operating system
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
76
Brian works in the mortgage loan department of a bank.He enters information on credit applications into the bank's computer system.The system has a program that evaluates the loan application and gives it a score.Brian is using a(n)________.
A)expert system
B)enterprise resource planning system
C)decision support system
D)information interface
A)expert system
B)enterprise resource planning system
C)decision support system
D)information interface
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
77
________ tie geographical regions together using long-distance telephone lines or satellite transmissions.
A)Local area networks
B)Executive information systems
C)Database systems
D)Wide area networks
A)Local area networks
B)Executive information systems
C)Database systems
D)Wide area networks
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
78
Bill is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Bill likely using to create the brochure?
A)Word processing program
B)Desktop publishing program
C)Presentation graphics program
D)Spreadsheet program
A)Word processing program
B)Desktop publishing program
C)Presentation graphics program
D)Spreadsheet program
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
79
Electronic spreadsheets ________.
A)are special software used to create graphics
B)can replace managerial judgment in decision making
C)are used for numerical and statistical data
D)are very difficult to use
A)are special software used to create graphics
B)can replace managerial judgment in decision making
C)are used for numerical and statistical data
D)are very difficult to use
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
80
Margaret would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares,territories,and projected sales.In order to achieve maximum impact,Margaret should communicate her information to the company's senior executives using a ________.
A)staging software
B)desktop publishing
C)presentation software
D)production software
A)staging software
B)desktop publishing
C)presentation software
D)production software
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck